Главная
Study mode:
on
1
Intro
2
Fido
3
Oauth
4
PIV Standard
5
Other Options
6
Im a Hacker
7
YubiKey Info
8
Why I Chose YubiKey
9
OneTime Password Mode
10
Other Modes
11
Personalization Tools
12
Installation
13
Cloud Validation
14
Additional Validation
15
Local Validation
16
Validation Server
17
Security Considerations
18
Attack Modes
19
Misuse
20
Other Questions
21
Conclusion
Description:
Explore the world of affordable two-factor authentication in this 58-minute conference talk from BSidesLV 2015. Dive into the intricacies of using YubiKey for enhanced security in your projects. Learn about FIDO, OAuth, PIV standards, and various YubiKey modes including One-Time Password. Discover personalization tools, installation processes, cloud and local validation methods, and how to set up a validation server. Gain insights into security considerations, potential attack modes, and misuse scenarios. Perfect for hackers and security enthusiasts looking to implement cost-effective, robust authentication solutions.

A Hacker's Guide to Using the YubiKey - How to Add Inexpensive 2-Factor Authentication to Your Next Project

BSidesLV
Add to list
0:00 / 0:00